AT&T iPad hackers' chats were turned in by secret source
IDG News Service - The government's case against two men charged with hacking into AT&T's website to steal e-mail addresses from about 120,000 iPad users got a boost last year when a confidential source handed over 150 pages of chat logs between the two and other members of their hacking group.
Excerpts from the logs, published in the court record, apparently show them talking about the legal risk of their hacking adventures, as well as ways that they could maximize the embarrassment caused by the incident. The logs were handed over to federal investigators in July by an unnamed source who monitored the men's online IRC (Internet Relay Chat) conversations.
In a case that was unsealed Tuesday, Andrew Auernheimer, 25, and Daniel Spitler, 26, are charged with fraud and conspiracy to access a computer without authorization. Prosecutors say the two gained unauthorized access to AT&T's servers in early June 2010, and then downloaded 120,000 email addresses and unique ICC-ID (integrated circuit card identifier) numbers, used to identify mobile devices, which they then handed over to the press.
They could face five years in prison on the charges, the U.S. Department of Justice said in a press release. Prosecutors say that the hackers wrote a program called iPad 3G Account Slurper that launched a brute force attack against AT&T's servers, trying to guess ICC-ID numbers and then pairing them to user email addresses.
Spitler had not talked publicly about the incident, but in the days after it hit the press, Auernheimer gave several interviews, saying that the work was done by his hacking group in order to improve privacy for iPad users.
"We believe what we did was ethical," Auernheimer told Computerworld last June. "What we did was right."
But in chat excerpts posted by prosecutors, the men seemed most interested in gaining attention for their find. "[W]here can we drop this for max lols," asked Spitler in one exchange.
In another exchange, Spitler worried about whether the work is legal and asks to remain anonymous. "[D]unno how legal this is or if they could sue for damages," he said.
"[A]bsolutely may be legal risk yeah, mostly civil," Auernheimer replied, according to the transcript. "[A]bsolutely could get sued."
In another exchange, published after the media had reported the breach, Auernheimer apparently admitted that his group had not disclosed the issue to AT&T, according to court records. "[Y]ou DID call tech support right?" asked one hacker, named Nstyr. [cq] "[T]otally but not really," Auernheimer replied. "[I] don't... care [I] hope they sue me."
It's not clear who provided the logs to the U.S. Federal Bureau of Investigation, but around the time that happened someone anonymously posted the alleged names of the hacking group's members to the Full Disclosure mailing list, writing, "ATTENTION FBI - Want the real names folks involved in the iPad hack???" Spitler was among those identified in the post.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts